Abstract: Using root of trust to build trusted computing platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in ...
Abstract: Service providers tend to deploy application services to several different virtual machines (VMs) to improve the scalability and manageability of the cloud data center (CDC). Therefore, high ...
Reviews and recommendations are unbiased and products are independently selected. Postmedia may earn an affiliate commission from purchases made through links on this page. This article was created by ...